Remove changes files that have also appeared in 0.4.4 releases.

This commit is contained in:
Nick Mathewson 2020-08-12 08:51:43 -04:00
parent db10d00199
commit 06c31b1b79
31 changed files with 0 additions and 143 deletions

View File

@ -1,4 +0,0 @@
o Minor bugfixes (logging):
- Downgrade a noisy log message that could occur naturally when
receiving an extrainfo document that we no longer want.
Fixes bug 16016; bugfix on 0.2.6.3-alpha.

View File

@ -1,6 +0,0 @@
o Minor bugfixes (linux seccomp2 sandbox):
- Fix a regression on sandboxing rules for the openat() syscall.
The fix for bug 25440 fixed the problem on systems with glibc >=
2.27 but broke tor on previous versions of glibc. We now apply
the correct seccomp rule according to the running glibc version.
Patch from Daniel Pinto. Fixes bug 27315; bugfix on 0.3.5.11.

View File

@ -1,3 +0,0 @@
o Minor bugfixes (windows):
- Fix a bug that prevented Tor from starting if its log file
grew above 2GB. Fixes bug 31036; bugfix on 0.2.1.8-alpha.

View File

@ -1,4 +0,0 @@
o Major bugfixes (NSS):
- Fix out-of-bound memory access in `tor_tls_cert_matches_key()` when Tor is
compiled with NSS support. Fixes bug 33119; bugfix on 0.3.5.1-alpha. This
issue is also tracked as TROVE-2020-001.

View File

@ -1,3 +0,0 @@
o Minor bugfixes (onion services v3):
- Avoid a non-fatal assert log in an edge-case of opening an intro circuit
as a client. Fixes bug 34084; bugfix on 0.3.2.1-alpha.

View File

@ -1,3 +0,0 @@
o Minor bugfixes (onion service v3):
- Remove a BUG() warning that could trigger in certain unlikely edge-cases.
Fixes bug 34086; bugfix on 0.3.2.1-alpha.

View File

@ -1,3 +0,0 @@
o Minor features (entry guards):
- Reinstate support for GUARD NEW/UP/DOWN control port events.
Closes ticket 40001.

View File

@ -1,9 +0,0 @@
o Minor bugfixes (linux seccomp2 sandbox):
- Makes the seccomp sandbox allow the correct syscall for opendir
according to the running glibc version. The opendir function
either uses open or openat but the current code does not
differenciate between opendir and open calls. This adds a new
seccomp sandbox rule for opendir. This fixes crashes when
reloading torrc with sandbox enabled when running on glibc
2.15 to 2.21 and 2.26. Patch from Daniel Pinto. Fixes bug 40020;
bugfix on 0.3.5.11.

View File

@ -1,3 +0,0 @@
o Minor bugfixes (compiler warnings):
- Fix a compiler warning on platforms with 32-bit time_t values.
Fixes bug 40028; bugfix on 0.3.2.8-rc.

View File

@ -1,4 +0,0 @@
o Minor bugfixes (linux seccomp2 sandbox):
- Fix startup crash with seccomp sandbox enabled when tor tries to
open the data directory. Patch from Daniel Pinto. Fixes bug 40072;
bugfix on 0.4.4.3-alpha-dev.

View File

@ -1,5 +0,0 @@
o Minor bugfixes (correctness, buffers):
- Fix a correctness bug that could cause an assertion failure if we ever
tried using the buf_move_all() function with an empty input.
As far as we know, no released versions of Tor do this.
Fixes bug 40076; bugfix on 0.3.3.1-alpha.

View File

@ -1,5 +0,0 @@
o Minor bugfixes (relay, self-testing):
- When starting up as a relay, if we haven't been able to verify that
we're reachable, only launch reachability tests at most once a minute.
Previously, we had been launching tests up to once a second, which
was needlessly noisy. Fixes bug 40083; bugfix on 0.2.8.1-alpha.

View File

@ -1,4 +0,0 @@
o Minor bugfixes (testing):
- When running the subsystem order check, use the python binary
configured with the PYTHON environment variable. Fixes bug 40095;
bugfix on 0.4.4.1-alpha.

View File

@ -1,4 +0,0 @@
o Documentation:
- Replace most http:// URLs in our code and documentation with https://
URLs. (We have left unchanged the code in src/ext/, and the text in
LICENSE.) Closes ticket 31812. Patch from Jeremy Rand.

View File

@ -1,5 +0,0 @@
o Minor features (bootstrap reporting):
- Report more detailed reasons for bootstrap failure when the failure
happens due to a TLS error. Previously we would just call these errors
"MISC" when they happened during read, and "DONE" when they
happened during any other TLS operation. Closes ticket 32622.

View File

@ -1,7 +0,0 @@
o Minor features (directory authority):
- Authorities now recommend protocol versions that are supported
by Tor 0.3.5 and later. (Earlier versions of Tor have been
deprecated since January of this year.) This recommendation
will cause older clients and relays to give a warning on startup,
or when they download a consensus directory.
Closes ticket 32696.

View File

@ -1,3 +0,0 @@
o Minor features (linux seccomp2 sandbox):
- Permit the unlinkat() syscall, which some Libc implementations
use to implement unlink(). Closes ticket 33346.

View File

@ -1,7 +0,0 @@
o Minor bugfixes (rate limiting, bridges, pluggable transports):
- On a bridge, treat all connections from an ExtORPort as remote
by default for the purposes of rate-limiting. Previously,
bridges would treat the connection as local unless they explicitly
received a "USERADDR" command. ExtORPort connections still
count as local if there is a USERADDR command with an explicit local
address. Fixes bug 33747; bugfix on 0.2.5.1-alpha.

View File

@ -1,7 +0,0 @@
o Removed features (IPv6, revert):
- Revert the client port prefer IPv6 feature because it breaks the
torsocks use case. The SOCKS resolve command is lacking a mechanism to
ask for a specific address family (v4 or v6) thus prioritizing IPv6 when
an IPv4 address is asked on the resolve SOCKS interface resulting in a
failure. Tor Browser explicitly set PreferIPv6 so this should not affect
the majority of our users. Closes ticket 33796; bugfix on 0.4.4.1-alpha.

View File

@ -1,4 +0,0 @@
o Minor bugfix (SOCKS, onion service client):
- Also detect bad v3 onion service address of the wrong length when
returning the F6 ExtendedErrors code. Fixes bug 33873; bugfix on
0.4.3.1-alpha.

View File

@ -1,6 +0,0 @@
o Minor bugfixes (relay, usability):
- Adjust the rules for when to warn about having too many connections
to other relays. Previously we'd tolerate up to 1.5 connections
per relay on average. Now we tolerate more connections for directory
authorities, and raise the number of total connections we need
to see before we warn. Fixes bug 33880; bugfix on 0.3.1.1-alpha.

View File

@ -1,3 +0,0 @@
o Minor bugfix (onion service v3 client):
- Remove a BUG() warning that can occur naturally. Fixes bug 34087; bugfix
on 0.3.2.1-alpha.

View File

@ -1,6 +0,0 @@
o Minor features (Linux seccomp2 sandbox, compilation):
- Allow Tor to build on platforms where it doesn't know how to
report which syscall had caused the linux seccomp2 sandbox
to fail. This change should make the sandbox code more portable
to less common Linux architectures.
Closes ticket 34382.

View File

@ -1,3 +0,0 @@
o Deprecated features (onion service v2):
- Add deprecation warning for onion service version 2. Tor now logs a
warning once if a version 2 service is configured. Closes ticket 40003.

View File

@ -1,3 +0,0 @@
o Minor bugfix (control port, onion service):
- Consistently use 'address' in "Invalid v3 address" response to
ONION_CLIENT_AUTH commands. Fixes bug 40005; bugfix on 0.4.3.1-alpha.

View File

@ -1,3 +0,0 @@
o Minor bugfix (CI, Windows):
- Don't use stdio 64 bit printf format when compiling with MINGW on
Appveyor. Fixes bug 40026; bugfix on 0.3.5.5-alpha.

View File

@ -1,7 +0,0 @@
o Removed features:
- Our "check-local" test target no longer tries to use the Coccinelle
semantic patching tool parse all the C files. While it is a good idea
to try to make sure Coccinelle works on our C before we run a
Coccinelle patch, doing so on every test run has proven to be disruptive.
You can still run this tool manually with "make check-cocci". Closes
ticket 40030.

View File

@ -1,5 +0,0 @@
o Major bugfixes (NSS):
- When running with NSS enabled, make sure that NSS knows to expect
nonblocking sockets. Previously, we set our TCP sockets as blocking,
but did not tell NSS about the fact, which in turn could lead to
unexpected blocking behavior. Fixes bug 40035; bugfix on 0.3.5.1-alpha.

View File

@ -1,5 +0,0 @@
o Major feature (fallback directory list):
- Replace the 148 fallback directories originally included in
Tor 0.4.1.4-rc (of which around 105 are still functional) with
a list of 144 fallbacks generated in July 2020.
Closes ticket 40061.

View File

@ -1,6 +0,0 @@
o Minor features (security):
- Channels using obsolete versions of the Tor link protocol are no
longer allowed to circumvent address-canonicity checks.
(This is only a minor issue, since such channels have no way to
set ed25519 keys, and therefore should always be rejected.)
Closes ticket 40081.

View File

@ -1,3 +0,0 @@
o Minor features (defense in depth):
- Wipe more data from connection address fields before returning them to
the memory heap. Closes ticket 6198.